Sunday, April 13, 2025
HomeAndroidErrorFather Hackers Attacking & Control Android Device Remotely

ErrorFather Hackers Attacking & Control Android Device Remotely

Published on

SIEM as a Service

Follow Us on Google News

The Cerberus Android banking trojan, which gained notoriety in 2019 for its ability to target financial and social media apps, has continued to evolve and spread through various forks and variants. 

Recent research has uncovered a new campaign, dubbed ErrorFather, which leverages the Cerberus source code and utilizes a multi-stage dropper mechanism to deploy the banking trojan payload. 

The ErrorFather campaign, detected in September 2024, has seen a significant increase in malicious samples in recent weeks, indicating ongoing activity and the potential for widespread harm to unsuspecting users.

- Advertisement - Google News
 ErrorFather Telegram bot

The malware utilizes a multi-stage dropping technique, where the first-stage dropper installs a second-stage dropper from its assets using a session-based installation. 

While the second-stage dropper is packed and relies on a native library (libmcfae.so) to decrypt and load the final payload. The final payload, decrypted.dex, contains malicious functionalities like keylogging, overlay attacks, and remote access capabilities.

The ErrorFather campaign utilized a modified version of the Cerberus banking trojan, which it disguised through obfuscation and code reorganization. 

Third-stage dropper loading final payload

While initially detected as a new banking trojan based on its detection count, deeper analysis revealed strong code similarities with Cerberus, particularly in its shared preference settings and structure. 

However, the C&C structure of the ErrorFather variant differed from the original Cerberus and the more recent Phoenix botnet, indicating a unique evolution of the malware.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide(PDF)

The malware retrieves C&C server lists using two methods: statically from a primary C&C server and dynamically using a DGA, which generates domains based on the current Istanbul time using MD5 and SHA-1 hashing and appends one of four extensions. 

DGA used in the ErrorFather campaign

When the primary C&C server is unavailable, the malware attempts to connect to the generated domains, which was also observed in the Alien malware, but with variations in domain extension and lack of a static list.

It performs various actions, including sending device information, retrieving and storing data from the server, and capturing screen images for VNC functionality by leveraging accessibility services to gather sensitive data like keystrokes and contacts and sends error logs to the C&C server. 

The malware also checks for registered users and sends device status updates, indicating its continuous monitoring and control over the infected device.

Receives HTML injection file

The Cerberus malware employs an overlay attack to deceive victims into entering sensitive information and identifies potential targets by sending a list of installed applications. Once a target is found, the malware receives the corresponding HTML injection page. 

When the victim interacts with the target app, the malware overlays a fake phishing page, tricking the victim into divulging login credentials and credit card details, which enables the malware to carry out financial fraud.

According to the CRIL, the ErrorFather campaign, a Cerberus-based banking Trojan, leverages VNC, keylogging, and HTML injection to steal financial information. 

Despite being older malware, the modified Cerberus has evaded detection, where cybercriminals continue to repurpose leaked malware source code, highlighting the ongoing threat of Cerberus-based attacks.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...